TIME-VARYING METAMATERIAL-ENABLED DIRECTIONAL MODULATION FOR PHYSICAL LAYER SECURITY IN WIRELESS COMMUNICATION LINKS
Various embodiments comprise systems, methods, architectures, mechanisms and apparatus providing secure physical layer (PHY) transmission via metamaterial (MTM) leaky-wave antennas (LWAs) using directed modulation (DM) transmitters such as for orthogonal frequency-division multiplexing (OFDM) and non-contiguous (NC) OFDM transmissions, where the DM functionalities exploit the property of time-modulated arrays (TMAs) realized in 1-D and 2-D spaces through the MTM-LWAs.
Latest Rutgers, The State University of New Jersey Patents:
- Damping base for modular scanning probe microscope head
- Gene-edited basil plants resistant to downy mildew
- Anchorage System For Prestressing Non-Metallic Tendons
- SYSTEMS AND METHODS FOR TRAINING PHYSICS-INFORMED NEURAL NETWORK SURROGATE MODELS TO MODEL PHYSICAL PROBLEMS USING THE FINITE ELEMENT METHOD
- Method and kit for CCR2 expression profiling and disease stratification
This application claims the benefit of provisional patent application Ser. No. 63/275,391 filed on Nov. 3, 2021, entitled TIME-VARYING METAMATERIAL-ENABLED DIRECTIONAL MODULATION FOR PHYSICAL LAYER SECURITY IN WIRELESS COMMUNICATION LINKS (Attorney Docket No. RU-2021-153), which provisional patent application is incorporated herein by reference in its entirety.
GOVERNMENT INTERESTThis invention was made with government support under grant number ECCS-1818478 and ECCS-2028823 awarded by the NSF. The government has certain rights in the invention.
FIELD OF THE DISCLOSUREThe present disclosure generally relates to wireless communications and, in particular, to secret wireless communications.
BACKGROUNDThis section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present invention that are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present invention. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
Secret wireless communications systems are typically vulnerable to one or both of passive attacks and physical layer (PHY) spoofing attacks. Passive attacks are when an adversary is merely listening to an ongoing transmission with the aim of inferring secret messages without any form of communication with the legitimate parties. PHY spoofing attacks are where an adversary overhears the signals sent by a transmitter to a receiver, with a goal of sending spurious data to the receiver that have similar PHY characteristics as exhibited by the transmitter.
SUMMARYVarious deficiencies in the prior art are addressed by systems, methods, architectures, mechanisms and apparatus providing secure physical layer (PHY) transmission using metamaterial (MTM), leaky-wave antenna (LWA), and directional modulation. Various embodiments propose transmission architectures to enhance the physical layer security through the utilization of MTM-LWAs, such as via directed modulation (DM) transmitters for orthogonal frequency-division multiplexing (OFDM) and non-contiguous (NC) OFDM transmissions where the DM functionalities exploit the property of time-modulated arrays (TMAs) realized in 1-D and 2-D spaces through the MTM-LWAs.
A transmitter according to an embodiment comprises first and second leaky-wave antennas (LWAs), each LWA comprising a predefined number of microstrip unit cells separated from each other by a distance p, each first LWA microstrip unit cell cooperating with a corresponding second LWA microstrip unit cell to form thereby a respective unit cell stage having two inputs and two outputs; an input switch, for alternatively coupling an input signal for transmission to unit cell inputs of a first unit cell stage; a plurality of DPDT switches, each DPDT switch disposed between respective prior and subsequent unit cell stages, each DPDT switch alternately coupling prior unit cell stage output signals to subsequent unit cell stage unit inputs; and an output switch, for alternatively coupling final unit cell stage output signals to an output to provide thereby an transmission signal; wherein the DPDT switches are controlled in a manner causing directional modulation of the transmission signal such that the transmission signal exhibits a low bit error rate (BER) to a receiver at a desired location.
Additional objects, advantages, and novel features of the invention will be set forth in part in the description which follows, and will become apparent to those skilled in the art upon examination of the following or may be learned by practice of the invention. The objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the present invention and, together with a general description of the invention given above, and the detailed description of the embodiments given below, serve to explain the principles of the present invention.
It should be understood that the appended drawings are not necessarily to scale, presenting a somewhat simplified representation of various features illustrative of the basic principles of the invention. The specific design features of the sequence of operations as disclosed herein, including, for example, specific dimensions, orientations, locations, and shapes of various illustrated components, will be determined in part by the particular intended application and use environment. Certain features of the illustrated embodiments have been enlarged or distorted relative to others to facilitate visualization and clear understanding. In particular, thin features may be thickened, for example, for clarity or illustration.
DETAILED DESCRIPTIONThe following description and drawings merely illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Additionally, the term, “or,” as used herein, refers to a non-exclusive or, unless otherwise indicated (e.g., “or else” or “or in the alternative”). Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments may be combined with one or more other embodiments to form new embodiments.
The numerous innovative teachings of the present application will be described with particular reference to the presently preferred exemplary embodiments. However, it should be understood that this class of embodiments provides only a few examples of the many advantageous uses of the innovative teachings herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claimed inventions. Moreover, some statements may apply to some inventive features but not to others. Those skilled in the art and informed by the teachings herein will realize that the invention is also applicable to various other technical areas or embodiments.
Various embodiments provide novel transmission schemes using metamaterial (MTM), leaky-wave antenna (LWA), along with directional modulation, for enhancing physical layer (PHY) security. MTM-LWAs, which offer compact, integrated, and cost-effective alternatives to the classic phased-array architectures, are particularly of interest for emerging wireless communication systems including Internet-of-Things (IoT).
The embodiments fulfill the functionalities of directed modulation (DM) transmitters for, illustratively, orthogonal frequency-division multiplexing (OFDM) and non-contiguous (NC) OFDM transmissions, while enjoying the implementation benefits of MTM-LWAs. Specifically, various transmitter architectures based on time-modulated MTM-LWA are provided as a solution for physical layer security for the first time. The physical layer security for the proposed schemes are investigated from the point of view of both passive and active attacks where an adversary aims to decode secret information and feed spurious data to the legitimate receiver, respectively. Numerical simulations reveal that even when the adversary employs sophisticated state-of-the-art deep learning based attacks, the proposed transmission schemes are resistant to these attacks and reliably guarantee system security.
It is noted that the transmission signals discussed herein are discussed in terms of particular modulation schemes such as orthogonal frequency-division multiplexing (OFDM), Quadrature Phase Shift Keying (QPSK), and the like, various embodiments may also use other modulation schemes such as differential phase shift keying (DPSK), differentially encoded QPSK (DQPSK), phase-shift keying (PSK), frequency-shift keying (FSK), amplitude-shift keying (ASK), quadrature amplitude modulation (QAM) and so on.
1 INTRODUCTIONIn the emerging applications of the Internet-of-Things (IoT), IoT devices such as intelligent sensors and controllers, often operating on small-capacity batteries and running applications on ultra-low-power processors, will need to be able to communicate with each other, while being connected to the cloud. In this scenario, IoT gateways serve as an essential component in bridging IoT devices and the internet, thereby enabling device-to-device or device-to-cloud communication. As the IoT gateways will need to deal with critical tasks at the edge nodes, it is essential to ensure secure communication links between the gateway and the devices against any spoofing attacks by adversarial entities. Since end-to-end encrypted sessions between the edge devices and the gateway cannot be relied upon for secure communications due to the high computational and battery burden of such cryptographic strategies, there is an urgent need to develop physical-layer focused secure communication schemes.
Directional Modulation (DM), as a promising physical-layer secure wireless communication technique, has been rapidly developed in recent years. It has the key property of transmitting digitally modulated signals whose waveforms are well preserved only along a pre-selected direction along which legitimate users are located in free space. Directional modulation (DM) based on phased array (PA) has been widely adopted for wireless PHY security. This technique preserves the standard symbol constellation for the legitimate users (LUs) along predefined directions in the free space, while intentionally scrambles the signals in all other directions. The utilization of DM for securing the IoT devices necessities the generation of high-gain beams through compact, integrated, and cost-effective antenna designs. Most common solutions to design of arrays of planar radiating elements with low or moderate directivity typically involve patch antennas, singularly activated or arranged in series to enhance the directivity of the single element. Phased arrays, however, require the use of feeding networks to control the excitation coefficients at the input ports. Digital beam-scanning technique are nowadays well established, but they involve bulky structures to accommodate multiple transceivers. More importantly, the corresponding feeding networks may be very complex, power consuming and expensive due to the heavy use of data converters.
A solution to achieve directional beams scanning with frequency is based on metamaterial leaky-wave antennas (MTM-LWAs). These 1-D antennas enable the radiation of a high-gain fan beam leveraging on the excitation of an aperture field having exponential decay along one longitudinal direction. Furthermore, linear arrays of leaky-wave antennas (LWA) also have been put forth as an alternative to conventional two-dimensional (2-D) phased arrays, due to the possibility of obtaining narrow scannable beams with only a 1-D set of phase shifters, thereby reducing drastically the complexity and cost of the feeding network. In such structures, the radiated beam may be scanned both in elevation, by acting on the operating frequency as is typical in leaky-wave radiators, and also in azimuth, by acting on the phase shift between adjacent elements. The main beam direction is determined both by the value of the phase constant of the leaky mode excited along the array and by the imposed phase shift. This LWA solution is considerably low cost with respect to conventional 2-D phased arrays and can substantially reduce the design complexity and fabrication, as well as the losses introduced by the feeding networks of the active sources of the array.
Various embodiments comprise a novel secure architectures to fulfill the DM functionalities through utilization of MTM-LWAs for both 1-D and 2-D spaces. As orthogonal frequency-division multiplexing (OFDM), or its variations like non-contiguous (NC) OFDM, have been widely adopted in the modern wireless communication systems, especially IoT standards, various embodiments exploit the property of time-modulated arrays (TMAs) to construct OFDM/NC-OFDM DM transmitters. In TMA technique, time is used as a new degree of freedom for the array design where connecting and disconnecting the antenna elements from the feeding network in time domain would further manipulate the radiation pattern. To exploit the aforementioned benefits of the LWAs over the conventional phased arrays, various embodiments provide secure configurations are based on the idea of time modulated MTM-LWAs which incorporate time-domain switches between the MTM unit cells. Furthermore, to enable beam scanning of LWAs at a fixed frequency the various embodiments make use of tunable unit cells where a controllable inner state (On/Off) is associated with each cell. The inventors investigated the resilience of the proposed transmission architectures against passive and active adversary that either wishes to decode secret information bits or spoof a legitimate transmitter by feeding spurious data to the receiver. It is assumed that deep learning tools are used by the adversary for conducting PHY spoofing in order to evaluate the system security against state-of-the-art powerful attacks. Numerical results demonstrate that various embodiments provide physical layer security by exploiting the unique advantages of the MTM-LWA and DM.
The following portions of the specification are organized as follows. The system model is described in Section 2 along with the adversary model describing the state-of-the-art deep learning tools for PHY spoofing attack. The principles of the MTM-LWAs are presented in Section 3. Secure configurations are proposed in Section 4. Numerical results are presented in Section 5, and a conclusion is presented in Section 6.
2 SYSTEM MODELFor passive attacks such shown in
The communication link between the Tx and Rx is assumed to operate over a total bandwidth B composed of a set of K subcarriers. The transmitter can either transmit over the whole band in the case of OFDM signals, or a subset of subcarriers (known as active subcarriers) in the case of NC-OFDM transmissions. OFDM/NC-OFDM signals corresponding to one symbol duration may be written as:
-
- where sk∈ and pk∈ are the complex modulated symbol and a power factor applied upon the kth subcarrier, respectively.
The total duration of one NC-OFDM/OFDM symbol is given by T0=Ts+Tcp, with Ts and Tcp being the NC-OFDM symbol duration and the duration of the cyclic prefix, respectively. Furthermore, v is called subcarrier occupancy pattern, which is a binary vector of size K whose ith element is zero when the ith subcarrier is inactive, and it is one when the subcarrier is active. Particularly, for an OFDM transmission v amounts to an all-one vector of size N. The center frequency of each subcarrier is denoted by fk=f0+kΔf where f0 is the carrier frequency and Δf=1/Ts represents the width of each subcarrier.
The actual signal radiated to the wireless medium depends on the specific antenna architecture that is utilized by the Tx. Denoting the radiated OFDM/NC-OFDM signal by R(t), the received signal by a party is given by the convolution y(t)=R(t)*h(t)+n(t), where n(t) is additive white Gaussian noise, and h(t) is the corresponding channel impulse response (CTR) between the two parties. The discrete received samples are given by y(ti), where i=0, . . . , n1−1 and n1 represents the number of (complex) samples. It is assumed that noise samples at different time instances ti's are independent and identically distributed (i.i.d.) with zero mean and variance N0/2. Denoting R=[R(t0), . . . , R(tn
respectively. One can verify that Q equals Nab/N where Na denotes the number of active subcarriers, and b is the number of bits sent over each subcarrier.
The actual signal radiated to the wireless medium depends on the specific antenna architecture that is utilized by the Tx. Denoting the radiated OFDM/NC-OFDM signal by R(t), the received signal by a party is given by the convolution y(t)=R(t)*h(t)+n(t), where n(t) is additive white Gaussian noise, and h(t) is the corresponding channel impulse response (CTR) between the two parties. The discrete received samples are given by y(ti), where i=0, . . . , n1−1 and n1 represents the number of (complex) samples. Assume noise samples at different time instances ti's are independent and identically distributed (i.i.d.) with zero mean and variance N0/2. Denoting R=[R(t0), . . . , R(tn
respectively, assuming
where Na denotes the number of active subcarriers, and b is the number of bits sent over each subcarrier.
To analyze the best performance achievable by a passive adversary, assume the Tx is utilizing OFDM transmission and the decoding is done with perfect synchronization assumption through the Inverse Fast Fourier Transform (IFFT) process. However, it is noted that OFDM signals are inherently susceptible to PHY spoofing attacks as the corresponding transmission parameters may be inferred with no ambiguity by cylcostationary analysis. Therefore, in order to investigate the performance of the PHY spoofing attacks, assume the Tx employs NC-OFDM signals which are known for their low probability of exploitation characteristics and enhanced security in comparison to an OFDM-based transmission. Specifically, the Tx chooses the parameters Δf, u and N and transmits NC-OFDM signals. The positions of active subcarriers in u are chosen in a random fashion for each NC-OFDM symbol. The adversary seeks to find these transmission parameters in order to generate waveforms similar to (1), inject spurious data in place of sn, and transmit them to the receiver. Assume the Rx only decodes data that are being sent over the active subcarriers with the correct Δf and N chosen by Tx; otherwise, a decoding failure will occur. Therefore, utilize bit error rate (BER) at Rx as a measure to evaluate the performance of the adversary in terms of spoofing. If this BER is close to that of the baseline transmission (where the parameters are perfectly known at the Rx), it is indicative of the maximum spoofing performance of the adversary. At the other extreme, a BER close to 0.5 suggests that the adversary cannot do much in terms of spoofing (i.e., Tx-Rx transmission is secured against PHY spoofing). It is noted that the subcarrier allocation pattern is assumed to be known at the Rx in a similar setting to a code division multiple access (CDMA) system where different users share spreading codes (a binary sequence) with a base station (BS) which are assumed to be known by the BS as part of the multiuser detection process.
Regarding the model for the active attacks, it is noted that the adversary has access to radio equipment for overhearing the transmissions between two legitimate parties. Furthermore, it is assumed that the adversary is aware of the antenna architecture used by the Tx and is able to generate NC-OFDM signals with the estimated parameters and transmitting them to the Rx. Also considered is a setting where the adversary has resources for data processing via deep learning algorithms. Adversary can sample the received signals, and build up a dataset out of these samples where each data entry corresponds to an NC-OFDM signal. The data samples may or may not be associated with the corresponding true transmission parameters, i.e., Δf, N and v, referred to as labels. Depending on the availability of the labels during the training stage, two types of deep learning algorithms are useful: supervised and unsupervised. The former makes use of the labels for training the DNNs while the latter exploits possible data structure and clustering methods without using labels. Also considered are the state-of-the-art algorithms proposed in for PHY spoofing where feed-forward fully connected deep neural networks are utilized for the supervised scenario while the unsupervised attack relies on variational auto-encoders (VAEs).
3 METAMATERIAL LWAAn MTM leaky-wave antenna may be realized by a cascade of composite right/left-handed (CRLH) unit cells, which has recently been utilized in various scenarios, such as radar sensing, 2D beamforming, and active antennas.
-
- where the phase function equals
-
- α denotes the leakage factor, I0 represents the input signal, and
-
- is the wave number. For MTM-based LWA, the beam steering angle ψ0 is a function of the input frequency and is expressed by
-
- where β(w) is the phase constant and ω is the angular frequency. For the CRLH LWAs, β(w) is determined by the equivalent circuit model for each unit cell.
It should be noted that the beam scanning angle defined in (4) only corresponds to the conventional beam scanning array with uniform cells where the phase constant remains the same across the array. In nonuniform cases, each MTM cell may have different phase constants depending on the internal mode as will be discussed in the next section.
3.1 LWA Antenna Beam Scanning at a Fixed FrequencyAs the frequency-dependent beam scanning feature of the LWAs may be a limiting factor in certain applications, novel LWA designs have been proposed in the literature in order to enable beam scanning at a fixed frequency. In particular, various embodiments may use a digitally modulated array factor (DMAF) method for the MTM array in which each unit cell is associated with an ON/OFF state. This is made feasible by considering a two symmetrical J-shaped patterns for each unit cell whose equivalent circuit model contains an extra element compared to
-
- where p is length of one unit cell, and wsh and wse are given by
It is noted that tuning the capacitance Cg through the p-i-n diodes associated with each unit cell could result in two different phase constants with opposite signs in a fixed frequency.
-
- where the phase-delay of the ith unit cell, normalized by its length, is denoted by
Consequently, the final radiation pattern for this tunable MTM configuration may be obtained by plugging (8) in (2), and expressed as
In this section, embodiments are provided of transmitter architectures enabled by MTM LWAs which make secure transmission to a legitimate receiver feasible through generating highly directive beams. To this end, tunable unit cells introduced in Section 3.1 are utilized which enables the beam steering capability of the LWAs at a fixed frequency. Start with the 1D case and further extend the idea to 2D setting.
4.1 Time-Modulated CRLH LWAThe first secure architecture proposed is time-modulated LWAs. Time-modulation arrays (TMAs) are phase arrays consisting of linear antenna elements whose radiated power patterns are controlled by periodically enabling and disabling the excitation corresponding to each individual array element. A standard TMA system consisting of an N-element linear antenna array is illustrated in
where θ∈[0,π] The various embodiments contemplate a design of the time-domain switches Un(t) aiming at achieving two important goals; namely, (1) Preservation of the original transmitted signal waveform along the desire spatial direction, and (2) Distortion of the transmitted signal waveform along the undesired directions. To this end, as the nth switch, a rectangular pulse starting at time tns and ending at tne is employed which is defined by
-
- for the cases tne>tns and tne<tns, respectively, where the
-
- denotes the repetition time period of the switch waveform.
The on-time period for the nth switch is always less than Tp and equals to Δtn=tne−tns when tne>tns, or Δtn=Tp+tne−tns when tne<tns. Through Fourier series analysis, it is shown that choosing unique starting times while having identical on-time periods, denoted by Δt, for all the switches leads to the fulfillment of the two goals along θ0, given the following is satisfied:
By comparing the radiated signal formula for LWAs in (2) or (10) with that of the above phased array (11), it follows that time-modulated idea may be realized through MTM LWAs as well if one is able to control (On/Off) the input signal to each unit cell. Towards this goal, one may naively place a switch between the unit cells in the leaky guiding structure which could either incite or suppress the subsequent unit cell. However, under this architecture, if a switch located before a unit cell is off, the input signal can not reach to the subsequent units.
The time-modulated CRLH LWA 700 of
The second transmission line 720 comprises a microstrip unit cell transmission line configured to propagate a wave therethrough to provide an output signal to be radiated into free space, whereas the first transmission line 720 comprises a lumped elements unit cell transmission line configured to provide a desired or required phase for the wave propagated through and out of the second transmission line 720. That is, the second transmission line 720 behaves like an antenna, whereas the first transmission line 720 is used to provide the required phase change for the propagated/transmitted wave of the second transmission line 720. The required phase change is the phase change necessary to direct the free space radiated signal in the manner discussed herein with respect to the various figures.
Referring to
A first double-poll double-throw (DPDT) switch SW-1 disposed between the first 710 and second 720 transmission lines controllably couples output signals of the first unit cells 715-1/725-1 to respective inputs of the next unit cell in the same respective transmission line (i.e., output 715-1 to input 715-2, and output 715-2 to input 725-2), or the next unit cell in the other transmission line (i.e., output 715-1 to input 725-2, and output 725-1 to input 715-2).
A second DPDT switch SW-2 disposed between the first 710 and second 720 transmission lines controllably couples output signals of the second unit cells 715-2/725-2 to inputs of the third unit cells (715-3/725-3 or 725-3/715-3).
A third DPDT switch SW-3 disposed between the first 710 and second 720 transmission lines controllably couples output signals of the third unit cells 715-3/725-3 to inputs of the fourth unit cells (715-4/725-4 or 725-4/715-4).
A fourth DPDT switch SW-4 disposed between the first 710 and second 720 transmission lines controllably couples output signals of the third unit cells 715-3/725-3 to inputs of the fourth unit cells (715-4/725-4 or 725-4/715-4).
A fifth DPDT switch SW-5 disposed between the first 710 and second 720 transmission lines controllably couples output signals of the fourth unit cells 715-4/725-4 to inputs of the fifth unit cells (715-5/725-5 or 725-5/715-5).
An output switch SW-OUT controllably couples an output signal from either one of the sixth unit cells 715-6/725-1 to provide thereby an output signal OUT.
The time-modulated CRLH LWA 700 of
where N′ denotes the number of microstrip unit cells.
It is noted that for a typical LWA the values of αp are pretty small (e.g., a typical value of a may be as a constant at the average value of 0.02 while p may be in the order of a centimeter or 0.01), and the exponential term (e−α(n′-1)p) may be approximated by one. The inventors therefor concluded that the choice of the switches in (13) would result in time-modulated LWAs. For simplicity of discussion, the various embodiments will be described within the context of time-modulated LWAs that only have one unit cell on at a time. Then, the DM functionality goals may be achieved if the switch parameters are chosen as
Generally speaking, the transmitter of
4.2 Time-Modulated Parallel Feeding with Plain CRLH LWA
For this architecture, a standard TMA system consisting of an N-element linear antenna array is considered where two consecutive antenna elements are placed a certain distance d apart, and have identical isotropic active element patterns. It is proposed to equip each branch with a CRLH LWA which would enable radiation in a 2D space. The input signal is split into N copies with identical power, phase-delayed and then goes through a time-domain On-Off RF switch Un(t). These switches are designed to enable the DM functionality for the transmission through the antenna array. However, before reaching to the end of branch the time-domain manipulated signal is fed to a CRLH LWA in each branch with N′ unit cells spaced p apart.
A schematic of this configuration is presented in
In fact, the LWA radiates signal through the elevation angle ψ while the antenna array's signal propagates in the azimuth direction θ. Mathematically, the radiated signal into the space for this configuration may be obtained based on the array factor approach of a 2D LWA structure and TMA principle, such as expressed as
-
- where θ∈[0,π/2] and ψ∈[0,2π].
Also, the wave number is defined as
where f0 and c denotes the carrier frequency of the input signal and the speed of light, respectively. The choices of switches Un(t) in (12) and (13) will realize the DM functionalities, i.e., preserving the input signal along θ0 and ψ0 during transmission and distorting it along any other direction. By utilizing such switches in (18) for the desired angles θ0 and ψ0, the following is provided
-
- which indicates that the original signal is preserved scaled by a gain which is a function of beamforming, switches' on-time period, and the LWA characteristics.
For the undesired spatial angles, on the other hand, the received signal is distorted in the time-domain as follows
In fact, for this architecture the DM functionalities along the both θ and ψ angles are realized via only one set of switches denoted by Un(t).
4.3 Time-Modulated Parallel Feeding with Switch-Enabled CRLH LWA
This configuration is envisaged based on the combination of the previous two cases. Specifically, as shown in
-
- where θ∈[0,π/2] and ψ∈[0,2π].
Similar to the previous configuration, the switches Un(t) and U′n(t) are designed based on the set of solutions in (16) and (17). As a result, for the desired angles θ0 and ψ0, the received signal becomes
-
- while for every other angle the received signal is distorted as
-
- where the V function is given in (21) and V′ is defined by
For this configuration, one can verify that the DM functionalities are implemented via two set of switches corresponding to that of the phased array and that of the LWAs.
5 NUMERICAL RESULTSIn this section, numerical simulations are used to characterize the performance of the proposed secure transmission schemes in Section 4 against the passive and active PHY attacks (see Section 2). Beginning with the time-modulated CRLH LWA proposed in section 4.1 where the number of unit cells and the period is set to N′=10 and p=0.012, respectively. The input signal is considered to be an OFDM signal with K=16 subcarriers, carrier frequency f0=4.9 GHz where QPSK modulation is used at each subcarrier to map the bits into complex symbols.
Next is considered a scenario where Tx, Rx and adversary are placed in a 2D space where Tx utilizes the proposed configurations proposed in Sections 4.2 and 4.3 for transmission. First is investigated the performance of the passive eavesdropping assuming the OFDM signal is being transmitted. Here, the OFDM carrier frequency is set to f0=4.9 GHz and a tunable LWA, as described in Section 3.1, is used at each branch to enable beam scanning at a fixed frequency. The desired angles are set to θ0=400 and ψ0=186°. For the switches in each branch and the switches between unit cells, various embodiments have used an identical on-time duration of Δt/Tp=1/N and Δt/Tp=1/N′, respectively, where Tg is set to be T0. The BER decoding performances are reported as a function of a receiver's spatial angles with respect to the Tx, and Eb/N0=8 dB which is computed in a similar fashion to the case of
Next is investigated the resilience of the proposed configurations against state-of-the-art PHY spoofing attacks as an instance of the active adversary scenario. To this end, it is assumed that the adversary is equipped with resources to build a dataset out of the received signals and lunch a data-driven attack based on deep learning algorithms. These algorithms are powerful tools for extracting structural information from a given dataset when labels are not available (unsupervised), or finding a mapping function to the available labels (supervised). The labels used herein correspond to specific transmission parameters, i.e., subcarrier occupancy pattern (v), total number of subcarriers (K) and the subcarrier width Δf.
For supervised spoofing (SS) attacks, consider two deep neural networks (DNNs) illustrated in
The various embodiments address unsupervised spoofing (US) attacks using the variational auto-encoders (VAEs) which are based on the idea of variational inference. By training a VAE on a dataset of NC-OFDM signals, important PHY characteristics can be inferred through the analysis of the latent variables. In a US attack a DNN (encoder) is aimed at capturing information from the NC-OFDM signals which can be used by a second DNN (decoder) to reconstruct the signal. This information is encoded in the fixed number of latent variables. A US attack first identifies those latent variables which are used by the decoder, and refers to them as informative latent variables. The number of informative latent variables is related to the total number of subcarriers K. Furthermore, through the latent traversal technique, the value of an informative latent variable is shown to be related to the amount of power in a certain subcarrier. As there is zero power associated with an inactive subcarrier, this procedure would lead to estimation of the subcarrier allocation pattern (v).
In terms of specifics of the attack model, the transmission is assumed to take place over an NC-OFDM scheme with Δf∈[15,30,45,60] KHz and pn∈[1,2] utilizing QPSK modulation with random subcarrier occupancy pattern using the total number of subcarriers K=16 and K=32, which give rise to 216 and 232 distinct subcarrier occupancy patterns, respectively. Adversary overhears the transmissions at a certain spoofing SNR and builds up a dataset out of the received noisy signals where 80 complex samples are collected from each signal. The size of the training and the test dataset is set to 2×106 and 25×104, respectively.
In particular,
Various embodiments propose transmission architectures to enhance the physical layer security through the utilization of MTM-LWAs. Specifically, in the proposed configurations, the DM functionalities of the TMAs are realized in 1-D and 2-D spaces through the MTM-LWAs which have much lower complexity in comparison to the classic alternatives like phased-arrays. Furthermore, the various embodiments exhibit resilience of these architectures against passive eavesdropping and active PHY spoofing attacks. For the former case, the TMAs with OFDM signals are considered while NC-OFDM transmission is employed for the latter scenario. In particular, it is assumed the adversary has access to state-of-the-art deep learning tools for PHY spoofing. It is shown as part of the numerical results that the proposed transmission schemes substantially enhance the physical layer security through the generation of highly directive beams which incur substantial interference to the adversary's received signal even with small perturbation with respect to the desired angles.
The time-modulated CRLH LWAs, such as described above with respect to the one-dimensional antenna of
The various embodiments provide high security due to the directionality. However, this directionality provides numerous other advantages and use case support, such as with respect to focused interaction with Internet of Things (IoT) devices while avoiding adversary spoofing and simply interference from proximate IoT devices. The various embodiments advantageously provide beamforming, but in in a manner where time modulation is operative to reduce the usual side lobes of a transmitted signal.
The embodiments described above such as with respect to
It is noted that the modulation scheme OFDM is generally discussed with respect to the various embodiments. However, other modulation schemes may also be used. In addition to continuous or non-continuous OFDM, any single carrier or multicarrier modulation scheme may be used (e.g., QAM, BPSK and so on).
Various embodiments provide a physical layer security antenna array that can provide directional modulation in 2D space through the use of meta material antenna arrays with time modulation. By modulating the control waveforms for both feeding network and unicell of metamaterial antenna, there is provided a very flexible control of the radiation beam with PHY security such that at the desired angle in two dimensional space it has a very low BER such that the correct information is sent to the desired location while other locations have high BER/distorted signals.
Various embodiments use time modulation with leaky-wave antennas to provide physical security. Prior 2D steering of the antennas without using multiple antennas spread out geographically or at different locations (e.g., phased array antennas as is known), whereas the various embodiments provide a series of linear leaky-wave antennas implementing beam forming and time modulation in a compact architecture to provide high BER of a transmitted signal at non-receiver locations.
It will be appreciated that the controller 1700 described herein may be located within a network (not shown) including various provider equipment, network management equipment, and so on. The controller function may also be used at a transmission point, such as a fixed or portable transmitter configured to use various embodiments such as discussed above.
As depicted in
It will be appreciated that the controller 1700 depicted in
The communications interface 1730 facilitates communications with various elements within or related to a network or transmitter configured or operating in accordance with the embodiments.
The memory 1720 is depicted as storing computer instructions executable by the processor 1710 to implement various functions associated with the network 100 of
The configuration manager 1720-CM is used to manage the various elements of a network or transmitter configured to use the time-modulated CRLH LWAs such as described above with respect to the various embodiments. Such elements may be implemented at base stations, eNodeBs, relays, relay clusters, nodes, sounders, and various other types of transmitting devices, both portable and fixed.
The relay selection and beamforming module 220-RSBM operates to select appropriate relays/switches for use in forwarding a signal, as well as determining the beamforming characteristics to be used in forwarding that signal, as described above.
The cluster timing/phase control module 220-CTPCM supports timing and/or phase control mechanisms suitable for use in enabling the various time-modulated CRLH LWAs such as described above.
Further embodiments are now discussed with respect to a time modulated metamaterial (MTM) antenna array transmitter capable of realizing 2D directional modulation (DM) for physical layer (PHY) security. The 2D DM MTM antenna array is formed by a time modulated corporate feed network loaded with composite right/left-handed (CRLH) leaky wave antennas (LWAs). By properly designing the on-off states of the switch for each antenna feeding branch as well as harnessing the frequency scanning characteristics of CRLH LWAs, 2D DM can be realized to form a PHY secured transmission link in the 2D space. Experimental results demonstrate the bit-error-rate (BER) is low only at a specific 2D angle for the orthogonal frequency-division multiplexing (OFDM) wireless data links.
1 INTRODUCTIONDirectional modulation (DM)-based physical-layer (PHY) security for wireless communication systems has advanced rapidly in recent years, owing to its ability to create wireless link at a specific direction with low bit-error-rate (BER). One way to realize DM is based on a time-modulated array (TMA), where the excitation of each array element is periodically enabled and disabled with the use of switches. By properly choosing the control waveform of switches, DM can be synthesized in a way that the signal is transmitted in a desired angle and distorted in all other unwanted angles, thereby resulting in PHY security.
Nevertheless, most of the reported TMA-based DM schemes can only provide PHY security in the 1D space, which may limit the applications where 2D secured links are needed. The various embodiments provide a DM scheme where using CRLH MTM LWA as antenna elements with frequency dependent beam scanning characteristics for TMA. Such integration enables a 2D DM where a secured angle can be formed for both azimuth and elevation directions. As proof-of-concept, a prototype of TMA containing four CRLH MTM LWAs is designed and developed, in which both simulated and measured results for the BER show that the proposed MTM TMA can preserve the signal in desired direction while distorting it in all other angles in 2D space.
2 OPERATING PRINCIPLESAs depicted, each of the M TMA branches comprises an RF switch 1810, a phase-delay module 1820, and a composite right/left-handed metamaterial leaky-wave antenna (CRLH MTM LWA). An input signal, such as an OFDM signal to be transmitted, is provided to each of the M branches for subsequent transmission in accordance with respective on-off state timing of the branches (i.e., U1(t) through UM(t)), the on-state being selected via a control signal imparted to the corresponding switch 1810 via, illustratively, the controller 1802 or other control or timing mechanism. Each branch phase delay module configured to receive the common input signal and provide a respective phase delayed input signal to the respective branch CRLH MTM LWA for transmission thereby during an on-state of the branch. The CRLH MTM LWA of each branch being separated from a CRLH MTM LWA of an adjacent TMA branch by a distance d. The branch on-off states are controlled in a manner causing directional modulation (DM) of the transmission signal such that the transmission signal exhibits a low bit error rate (BER) to a receiver at a desired location.
Referring to
-
- where S(t) is the input signal,
-
- while M is the number of branches and Nis the number of cells in each CRLH MTM LWA, k0 is the free space wave number, d is the distance between the adjacent LWAs, γ is the main beam angle for an individual LWA (which is a function of frequency), p is the length of CRLH unit cell, α is the leakage factor, and β(ω) is the phase constant of CRLH transmission line.
So, for focusing the main beam of the 2D prototype to the point (θ0,φ0), the input frequency should be tuned to have:
-
- and the required phase shift of the signal in each branch should be given by φm.
- In addition, Um(t) is a periodic square switching waveform starting at time tms and ending at tme, which can be defined as:
-
- for the cases tme>tms and tme<tms, respectively.
Here,
denotes the period of the switching waveform. By expanding Um(t) in terms of the Fourier series, the following is obtained:
The on-time period for the mth switch is less than Tp and may be equated to Δtm=tme−tms when tme>tms, or Δtm=Tp+tme−tms when tme<tms. It can be shown that by providing specific delay between Um(t)'s with the same duty cycle Δt, the input signal along (θ0,φ0) during transmission is preserved while being distorted along other directions. The DM can be achieved if the switch parameters are chosen as follows:
Finally, by sweeping the carrier frequency (f0) in the fast wave region of LWAs and providing appropriate φm through the use of external phase shifters, beam scanning in the 2D space is achieved. Moreover, thanks to the time-modulation technique, the signal is preserved in the desired direction while being distorted in all other unintended directions in the 2D, thereby enabling the PHY security.
3 DESIGN AND EXPERIMENTAL VERIFICATIONIn a some embodiments, the time-modulated Array (TMA) contains four composite right/left-handed (CRLH) MTM Leaky Wave Antennas (LWAs), in which both simulated and measured results for the BER show that the proposed MTM TMA can preserve the signal in desired direction while distorting it in all other angles in 2D space. This embodiment was used as a proof-of-concept 2D DM MTM array, and includes 12 CRLH cells with interdigital capacitors and shunt stub inductors cascaded to realize the CRLH LWAs to form a four-element array (i.e., N=12, M=4). The center frequency of the unit cell is designed to be 2.3 GHz with the fast wave region ranging from 1.9 to 3.5 GHz, in which the measured radiation patterns of fabricated LWAs are shown in
In an experimental configuration, the proof-of-concept 2D DM MTM array is injected with an OFDM input signal with 16 sub-carriers using a QPSK modulation scheme; BER is measured for several different cases. The time modulated antenna feed network is realized by a one-to-four Wilkinson power divider with PIN diodes (SMP1345 from Skyworks) used as RF switches. Moreover, phase shifters and CRLH LWAs are connected to the end of each branch of the time modulated feed network, respectively.
The control signals for the switches are realized using function generators or other control circuitry (e.g., controllers 1700 or 1802) in accordance with equations (34) and (35). A broadband Vivaldi antenna located in the far field region is used as a receive antenna. The measured BER results are obtained through commercially available software-defined radio (SDR) modules connected to both transmit and receive antennas, as shown in
The results illustrated by
Thus, a time modulated DM transmitter using CRLH MTM LWA as antenna elements enables 2D DM for PHY security. Experimental results by transmitting OFDM signal using the proposed 2D DM MTM array demonstrate a very low BER in the desired 2D angle, while much higher BER can be observed in all other undesired angles in comparison with the case without DM. The proposed 2D DM MTM array can be utilized to transmit PHY secured signals for wireless communications in the 2D space.
Although various embodiments which incorporate the teachings of the present invention have been shown and described in detail herein, those skilled in the art can readily devise many other varied embodiments that still incorporate these teachings. Thus, while the foregoing is directed to various embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof.
Claims
1. A transmitter, comprising:
- first and second transmission lines, each transmission line comprising a predefined number of unit cells separated from each other by a distance p, each first transmission line unit cell cooperating with a corresponding second transmission line unit cell to form thereby a respective unit cell stage having two inputs and two outputs; and
- a plurality of DPDT switches, each DPDT switch disposed between respective prior and subsequent unit cell stages;
- wherein the second transmission line unit cells comprise microstrip unit cells configured to propagate therethrough an input signal to provide thereby a transmission signal configured for free space radiation;
- wherein the first transmission line unit cells comprise lumped element unit cells having a circuit model equivalent to that of corresponding second transmission line microstrip unit cells;
- wherein the DPDT switches are controlled in a manner causing directional modulation (DM) of the transmission signal such that the transmission signal exhibits a low bit error rate (BER) to a receiver at a desired location.
2. The transmitter of claim 1, wherein the input signal comprises a dual carrier modulated signal.
3. The transmitter of claim 1, wherein the input signal comprises a single carrier modulated signal.
4. The transmitter of claim 1, wherein the input signal comprises an OFDM modulated signal.
5. The transmitter of claim 4, wherein the OFDM modulated signal comprises a non-contiguous (NC) OFDM modulated signal.
6. The transmitter of claim 1, wherein each of the first and second transmission lines comprise respective cascades of composite right/left-handed unit cells configured to form thereby a metamaterial leaky-wave antenna (CRLH LWA).
7. The transmitter of claim 1, wherein the DM is controlled to provide a usable modulated signal in a desired 2D space.
8. The transmitter of claim 6, further comprising:
- at least one additional CRLH LWA, wherein each CRLH LWA is separated from an adjacent CRLH LWA by a distance d; and
- a plurality of phase delay modules, each phase delay module configured to receive a respective common input signal and provide a respective phase delayed input signal to a respective CRLH LWA,
9. The transmitter of claim 8, further comprising a power divider configured to divide an input signal into a plurality of common input signals for use by respective phase delay modules.
10. The transmitter of claim 6, wherein the transmitter comprises time-modulated array (TMA) formed as a plurality of TMA branches, each TMA branch configured to receive a common input signal for transmission thereby;
- each TMA branch comprising a phase delay module and a composite right/left-handed metamaterial leaky-wave antenna (CRLH MTM LWA), the phase delay module configured to receive the common input signal and provide a respective phase delayed input signal to the respective CRLH MTM LWA for transmission thereby during an on-state of the branch, the CRLH MTM LWA being separated from a CRLH MTM LWA of an adjacent TMA branch by a distance d;
- each branch having an on-off state controlled in a manner causing directional modulation (DM) of the transmission signal such that the transmission signal exhibits a low bit error rate (BER) to a receiver at a desired location.
11. The transmitter of claim 10, wherein each TMA branch further includes a radio frequency (RF) switch configured to couple the common input signal to a respective phase delay module during an on-state of the TMA branch.
12. The transmitter of claim 10, wherein:
- the TMA transmitter comprises M TMA branches, wherein M is an integer greater than 1; and
- each CRLH MTM LWA comprises N CRLH cells, wherein Nis an integer greater than 1.
13. A 2D directional modulation (DM) transmitter, comprising:
- a time-modulated array (TMA) formed as a plurality of TMA branches, each TMA branch configured to receive a common input signal for transmission thereby;
- each TMA branch comprising a phase delay module and a composite right/left-handed metamaterial leaky-wave antenna (CRLH MTM LWA), the phase delay module configured to receive the common input signal and provide a respective phase delayed input signal to the respective CRLH MTM LWA for transmission thereby during an on-state of the branch, the CRLH MTM LWA being separated from a CRLH MTM LWA of an adjacent TMA branch by a distance d;
- each branch having an on-off state controlled in a manner causing directional modulation (DM) of the transmission signal such that the transmission signal exhibits a low bit error rate (BER) to a receiver at a desired location.
14. The TMA transmitter of claim 13, wherein each TMA branch further includes a radio frequency (RF) switch configured to couple the common input signal to a respective phase delay module during an on-state of the TMA branch.
15. The TMA transmitter of claim 13, wherein:
- the TMA transmitter comprises M TMA branches, wherein M is an integer greater than 1; and
- each CRLH MTM LWA comprises N CRLH cells, wherein Nis an integer greater than 1.
16. A 2D directional modulation (DM) transmission method, comprising:
- receiving a common input signal for transmission at each of a plurality of branches of a time-modulated array (TMA);
- each TMA branch imparting a respective a phase delay to a received common input signal and, during an on-state of the TMA branch, transmitting the respective phase delayed common input signal via a respective composite right/left-handed metamaterial leaky-wave antenna (CRLH MTM LWA) separated from a CRLH MTM LWA of an adjacent TMA branch by a distance d;
- each branch having an on-off state controlled in a manner causing directional modulation (DM) of the transmission signal such that the transmission signal exhibits a low bit error rate (BER) to a receiver at a desired location.
Type: Application
Filed: Nov 3, 2022
Publication Date: Jan 30, 2025
Applicant: Rutgers, The State University of New Jersey (New Brunswick, NJ)
Inventors: Alireza NOORAIEPOUR (New Brunswick, NJ), Shaghayegh VOSOUGHITABAR (New Brunswick, NJ), Chung-Tse Michael WU (New Brunswick, NJ), Waheed U. BAJWA (New Brunswick, NJ), Narayan B. MANDAYAM (New Brunswick, NJ)
Application Number: 18/706,608